Notes for Computer Information Technology 160
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

nov21.md 1.0KB

November 21

Overview

Base64

set x |x| > m set A, |A| == 64

ascii -> printable 8-bit clean text

base64 characters are [A-Z a-z 0-9 + /]

= is for padding

Trusted Communications

  • who said it = Authentication
  • can’t be denied = Repudiation
  • message cannot be altered = Integrity

algorithm(message, key) = encrypted message

t(w,k)=w[encrypted]

t(w[encrypted],k)=w

Public Key Encryption

You can encrypt data with a public key so that it can only be decrypted with a private key

You can sign data with a private key so it can be verified with a public key

When both of these are done you have trusted communication

Certs

proof that a public key belongs to a person marked by an authority